CPIO存储服务器不安全文件创建漏洞

漏洞信息详情

CPIO存储服务器不安全文件创建漏洞

漏洞简介

FreeBSD 2.1.0, Debian GNU/Linux 3.0以及可能还包括其他操作系统的cpio,在使用-O (存档)或者-F选项创建文件时会使用一个0 umask,创建了带有0666模式的文件,本地用户可以利用该漏洞读取或覆盖这些文件。

漏洞公告

The vendor has released an upgrade dealing with this issue.
Ubuntu linux has released an advisory (USN-75-1) dealing with this issue. Please see the referenced advisory for more information.
Debian linux has released an advisory dealing with this issue. Please see the referenced advisory for more information.
Mandrake has released an advisory (MDKSA-2005:032) to address this issue. Please see the attached Mandrake advisory for details on obtaining and applying fixes. Update (02/12/05): Mandrake has re-released advisory MDKSA-2005:032 as MDKSA-2005:032-1 to correct a problem (they would not install with rpmdrake) with fixes for Mandrake 10.1. See the references section.
Trustix has released advisory TSLSA-2005-0003 to address various issues in multiple products. Please see the referenced advisory for more information.
Red Hat has released advisory RHSA-2005:080-06 to address this issue. Please see the advisory in Web references for more information.
Silicon Graphics has released advisory 20050204-01-U dealing with this and other issues for their Advanced Linux Environment packages. Please see the referenced advisories for more information.
Turbolinux has released advisory TLSA-2005-30 to address this issue. Please see the referenced advisory for more information.
Conectiva has released security advisory CLSA-2005:1002 addressing this issue. Please see the referenced advisory for details on obtaining and applying the appropriate updates.
Avaya has released advisory ASA-2005-212 to indicate that Avaya CVLAN and Integrated Management products are vulnerable to this issue. Customers are advised to apply patches supplied by vendors of the underlying operating systems. Please see the referenced advisory for more information.
RedHat has released security advisory RHSA-2005:806-8 addressing this issue for their Enterprise and Advanced Workstation editions. Users are advised to see the referenced Web advisory for further information.
GNU cpio 1.0

GNU cpio 1.1

GNU cpio 1.2

Turbolinux Turbolinux Server 10.0

参考网址

来源: XF
名称: cpio-o-archive-insecure-permissions(19167)
链接:http://xforce.iss.net/xforce/xfdb/19167

来源: TRUSTIX
名称: 2005-0003
链接:http://www.trustix.org/errata/2005/0003/

来源: REDHAT
名称: RHSA-2005:080
链接:http://www.redhat.com/support/errata/RHSA-2005-080.html

来源: REDHAT
名称: RHSA-2005:073
链接:http://www.redhat.com/support/errata/RHSA-2005-073.html

来源: www.freebsd.org
链接:http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391

来源: DEBIAN
名称: DSA-664
链接:http://www.debian.org/security/2005/dsa-664

来源: OVAL
名称: oval:org.mitre.oval:def:10888
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10888

来源: REDHAT
名称: RHSA-2005:806
链接:http://www.redhat.com/support/errata/RHSA-2005-806.html

来源: MANDRAKE
名称: MDKSA-2005:032
链接:http://www.mandriva.com/security/advisories?name=MDKSA-2005:032

来源: support.avaya.com
链接:http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf

来源: SECUNIA
名称: 17532
链接:http://secunia.com/advisories/17532

来源: SECUNIA
名称: 17063
链接:http://secunia.com/advisories/17063

来源: SECUNIA
名称: 14357
链接:http://secunia.com/advisories/14357

来源: BUGTRAQ
名称: 20050204 [USN-75-1] cpio vulnerability
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=110763404701519&w=2

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享